A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
Nyx-net: network fuzzing with incremental snapshots
Coverage-guided fuzz testing (" fuzzing") has become mainstream and we have observed
lots of progress in this research area recently. However, it is still challenging to efficiently test …
lots of progress in this research area recently. However, it is still challenging to efficiently test …
Automatic firmware emulation through invalidity-guided knowledge inference
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
Sok: The long journey of exploiting and defending the legacy of king harald bluetooth
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
Sok: Enabling security analyses of embedded systems via rehosting
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …
developers and analysts to observe, and ultimately understand, how it works. This kind of …
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …
A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …
rise to significant security concerns. Various initiatives have been undertaken to bolster the …
[PDF][PDF] Forming Faster Firmware Fuzzers.
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …
art of running the firmware in a virtualized environment, rather than on the original hardware …